2012 Special Reports Library

Upcoming FCW Features

Most agencies have had some form of employee cyber security training for years, yet recent surveys and numerous news stories illustrate frequent lapses and low awareness of good security practices. This story will highlight successful techniques for assessing the effectiveness of security training programs and provide tips for holding employees more accountable for doing their part in keeping government systems secure.

Web mashups, applications that combine pieces of data and software functionality from different web sites, provide an early look at how the next generation of the Internet called Web 3.0 will work. Learn how agencies can promote transparency and accountability by preparing their own data and Web architectures to better support these pioneering mashups and lay the groundwork for the wider adoption of Web 3.0.

There are many similar concepts behind enterprise architecture (EA) and Information Technology Infrastructure Library (ITIL) methodologies. EA has been a fixture on the government IT and capital planning scene for years, and now ITIL is catching on as a way to improve IT management processes. This story will highlight the similarities between EA and ITIL and the opportunities for leveraging common efforts across both methodologies.

Writer: dave AT dperera DOT com

December 7 Smart Manager’s Guide

As agencies weigh shifting elements of their IT infrastructure to a third-party cloud computing provider, the ability to write effective contract service level agreements around security and performance issues becomes critical. Learn what service metrics and non-performance sanctions should be part of any cloud contract.